Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 17 Apr 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Arbitrary Code Execution via Untrusted Deserialization in Flair LanguageModel |
Fri, 27 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flair
Flair flair |
|
| Vendors & Products |
Flair
Flair flair |
Thu, 26 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deserialization of untrusted data in the LanguageModel class of Flair from versions 0.4.1 to latest are vulnerable to arbitrary code execution when loading a malicious model. | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: HiddenLayer
Published:
Updated: 2026-02-27T16:21:29.889Z
Reserved: 2026-02-23T19:38:10.854Z
Link: CVE-2026-3071
Updated: 2026-02-27T16:21:20.126Z
Status : Deferred
Published: 2026-02-26T15:17:48.803
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-3071
No data.
OpenCVE Enrichment
Updated: 2026-04-17T14:30:20Z